In this video, I talk about the recent problems I have had with my computer, initially started by a virus/malware issue that caused hardware damage to an 8GB stick of RAM & a 2TB Hard Drive.

I then go on to discuss anti-virus/malware and backups, both local & cloud-based.

At about the 06:15 point in the video, I mention a link for .

With, you get 15GB to start plus an extra 5GB if you get it through my link.

20GB is not bad for a free account!

Of course, you don’t have to go through my link, but if do, just Click Here

I also talk about a continuous on-line backup solution I use called Backblaze. Click Here to go there and check it out.


PC Problems, Virus, Firewalls and Backups?

The dreaded BSOD (Blue Screen Of Death)

You may well ask what all of this has got to do with Internet Marketing or running an On-line Home Business.

Surely this topic belongs in a blog focused on IT or computer related stuff!

Well, yes,  it is ” IT or computer related stuff”, but without a computer of some description it would be impossible to access the Internet – let alone run a business on it. Admittedly, there are tablets and smartphones, but it is generally easier and more efficient to use a desktop or laptop computer for this task.

However, if a tablet or smartphone is your preferred device, then please forgive my impertinence. But bear in mind that any device that accesses the Internet is potentially vulnerable and requires protection.

Also, this post concerns a PC, because that is what I use and what was attacked. But don’t get too smug if your ‘tech’ of choice is made by Apple Computers.

So, welcome to my latest post that unashamedly focuses on the computer or other devices  we all use every day and maybe even take for granted.

The Computer “Thingy” That Gets Me To My Website

Taken for granted and mostly overlooked, except when needed, that box of electronics that sits on your desk or lap is under constant threat when connected to the Internet. Unscrupulous people all over the world are always on the lookout for a vulnerable computer that can be exploited to gain access to your personal and financial information. They can also use it to launch attacks on other vulnerable machines, or even relay spam and phishing emails through it so it looks as if the messages are coming from you.

There’s no need for paranoia, just an awareness of the fact that threats  are always out there.

The crowd of sniveling under-rock-dwellers that spend their miserable little lives writing malicious code for the purpose of causing maximum disruption or stealing sensitive information, have been busy expanding their repertoire of coding mayhem into the realms of Apple’s OSX & IOS as well as Linux and Android Operating Systems.

During the course of my career, I have met a lot of very intelligent and talented individuals, who live and breath hardware and sof tware design. Most of them are still working very happily writing software and/or designing electronic products. Unfortunately, some have been led down a darker path, donning a “black hat” and wasting their considerable talents, by focusing on malicious software creation, cracking  and hacking. I don’t know why – maybe some kind of traumatic incident in their personal or business life acted as a catalyst and triggered a vengeful mindset.

But who really knows the reasons why? Except, maybe,  the individuals themselves.

The takeaway here is Vigilance .

Don’t become a sitting duck by thinking that it’s only Windows based PC’s that are vulnerable. There are always people, somewhere, actively working on exploits and thinking up different methods to gain access and take control of all popular operating systems, including OSX, IOS, Android and the more popular distributions of Linux.

Always ensure that the computer or device you work with, has known and respected Anti-Virus and Anti-Malware programs running, that receive at least daily updates to their definitions databases, so they are always prepared for the most current piece of nasty coding lurking out there. Also, always try to work behind a firewall, whether it’s the one built into your broadband router, as most are these days, or a software version installed on your computer/device.

Remember that everything is secure and robust before someone decides to launch an attack.

It’s only after the event when weaknesses are exposed. But, by that time, it is much too late.

My PC suffered a virus attack, although it didn’t look like that was the problem at first.

But, after a lot of investigation, research and diagnostics, I tracked all the problems down to a file with the magnificent name of zlibwapi.dll.wwbak that was sitting very nonchalantly in the system32 directory.

Now, there is a file called zlibwapi.dll which is associated with the zlib data compression library (zlib.dll). As ‘wapi’ is contained in the name, it would suggest that this file is a Windows Application Programming Interface (WAPI) that would act as an interface to an application requiring access to the library of functions contained within zlib.dll (dll = Dynamic Link Library).

So it’s quite normal to find both zlib.dll & zlibwapi.dll files on a PC, as there are many applications that use the compression functions in the library. Those that immediately spring to mind are any that manipulate photo, video or other graphics files. A quick search on my PC shows the files used extensively within Adobe applications as well as Camtasia and various video conversion programs.

I’ll be writing more on this in future posts, so stay tuned!

Mike Flanagan on BloggerMike Flanagan on EmailMike Flanagan on FacebookMike Flanagan on GoogleMike Flanagan on LinkedinMike Flanagan on PinterestMike Flanagan on TwitterMike Flanagan on VimeoMike Flanagan on WordpressMike Flanagan on Youtube
Mike Flanagan
In 2014, I retired from Senior Technical Executive post with a top level, global IT systems and solutions corporation. Freelanced in the late 1990's in my own IT consultancy business & rejoined the corporate world 2005. Now decided to go into business again, this time online with an Internet Marketing Company I call CS Marketing (the CS stands for Corporate Survivor). I help others interested in online business and use the technical and business skills gained throughout my professional career.